1 / 30

Cyber Analytics Project

Cyber Analytics Project. Team A khil Ashok Kanakkasserry Allan Babu Kurian Maninderjit Singh Tom Thomas. Content. Introduction Data collection and analysis techniques. Is our personal data is in right hands? Social Engineering Data Mining and Spamming

chakra
Download Presentation

Cyber Analytics Project

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Analytics Project Team Akhil Ashok Kanakkasserry Allan Babu Kurian Maninderjit Singh Tom Thomas

  2. Content • Introduction • Data collection and analysis techniques. • Is our personal data is in right hands? • Social Engineering • Data Mining and Spamming • Mobile Malware getting smarter? • Economic impacts of piracy. • Security analysis of NTP.

  3. Introduction • Cyber security deals with safeguarding the user information on the web • Cybercrimes have ever been rampant since the explosion of most modern internet technologies. • Though there are measures to contain and prevent them, new ways of exploiting the security measures adopted are being found out by hackers

  4. Research Tool Design for HackerWeb • Web tool in Visual Studio 2013, using the MVC architecture to query data from the hacker web. • A search engine to HackerWeb database. • Generates MySQL query for the database dynamically • The capability to query all the tables together and also the multilingual information

  5. Research Tool Design for HackerWeb

  6. Research Tool Design for HackerWeb

  7. Research Tool Design for Shodan • Shodan API was used to gather data for the analysis of the NTP ports • A basic python program using the shodan API was used to collect the count of NTP ports in various US cities. • Code Snippets #for cities is US results = api.search('port:123 city:”X” country:US') # Show the results print results['total'] #for countries results = api.search('port:123 country:Y') # Show the results print results['total']

  8. Question 1:Is our personal data is in right hands? • The rapid growth of social media is giving rise to new types of cyber threats. • These threats affects the psychological, social and cultural aspect of social media users. • Social Network sites act as a platform for Phishers and Spammers for carrying out their fraudulent activities. • Even the governments and organizations are finding it difficult to curb the cybercrimes related to social media.

  9. Sophos 2013 Security threat report Facebook is the most targeted place for cybercrime Threats percentage-pose on social network

  10. Social Media Suspicious Posts distribution

  11. Classification of cyber crimes • Social Engineering: Social engineering techniques are mostly used for identity thefts ,it includes the theft of users account credentials • Data Mining & Spamming: Cyber criminals use data mining techniques to extract the user information by using data collections methods like survey and questionnaire

  12. Social Engineering posts trend

  13. Source: Hacker Web Social Media spammer posts distribution

  14. Question 2:Mobile malware getting smarter? • As the web landscape is now inclined towards the internet of things, it is highly vulnerable to the mobile based malwares. • As the landscape is changing, malware author has learned to build the malware which cannot be identify by the cutting edge technology of detecting the virus.

  15. Things which helps cyber criminals to have an edge over mobile developer: • The mobile devices are becoming more efficient in handling traditional desktop task. • Second is the growth of mobile apps market. More users are downloading the apps regularly without doing any verification regarding the apps.

  16. Source: Hacker Web Mobile Malware Trends

  17. Mobile Vulnerability Distribution Source: Hacker Web

  18. Findings • IPhone and Android are mobile devices which are more vulnerable to malware • Even though the number of posts pertaining to Iphone are more, but the number of malware suspicious posts are more for Android devices. • we can infer that android platform is more vulnerable to cyber criminals as predicted by Cisco 2014 security annual report.

  19. Research Question 3: Analysis of Piracy Activity in Forums • Software Piracy is the unauthorized usage or copying of software. • Though copying for backup purposes is allowed, sharing is considered illegal. • The illegal sharing and copying of software causes losses to the count of millions of dollars to the software industry annually.

  20. Literature Review • Software crack is the modification of software to disable or remove features which are used to protect it from being used without the license. • Serial numberis a license code issued to the authorized user to validate his use of the software/application • Keygenis the another way to circumvent the authentication of the software

  21. Data Analysis-Serial Number Activity

  22. KeygenActivity

  23. Crack Activity

  24. Findings • The forum Unpack is highly active in distributing cracks, keygens and serial numbers • arhack, ashiyane, elitehack, myhandownload and vctool have a lot of discussions going on about serial numbers.

  25. Question 4: Analysis of security threat posted by NTP • Network Time Protocol (NTP) is an internet protocol used for time synchronization of clocks of computers to some time interface. • Security Concerns • Run replay attacks using captured OTP and Kerberos tickets before they expire. • Stop security-related cron jobs from running or cause them to run at incorrect times. • Make system and audit logs unreliable since time is alterable.

  26. Research Design & Data Obtained • Shodan API used to gather data for analysis of the NTP ports • A basic python program using the shodan API was used to collect the count of NTP ports in various US cities. The sample code is given below: #for cities is US results = api.search('port:123 city:”X” country:US') # Show the results print results['total'] #for countries results = api.search('port:123 country:Y') # Show the results print results['total']

  27. NTP Distribution In Major US Cities

  28. NTP Devices Distribution Across world

  29. Findings • The major finding is that US has about 25% of the total NTP vulnerabilities in the world. • Houston, New York and Dallas are most vulnerable in that order. But the distribution we found is all over the country.

  30. THANK YOU

More Related